Trojan viruses, posing as legitimate software, contain malicious code that can steal data or disrupt computer operations. They spread through email attachments, infected websites, and peer-to-peer networks, with various types including backdoor, downloader, and destructive trojans. To defend against them, users should update antivirus software, be cautious with email attachments, and avoid suspicious websites.